000 -LEADER |
fixed length control field |
01869cam a2200409 a 4500 |
001 - CONTROL NUMBER |
control field |
14823888 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20150728200547.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
070426s2007 maua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2007296772 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1597491330 [paperback] |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
OCO |
Transcribing agency |
OCO |
Modifying agency |
BAKER |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Reyes, Anthony |
245 10 - TITLE STATEMENT |
Title |
Cyber crime investigations : |
Remainder of title |
bridging the gaps between security professionals, law enforcement, and prosecutors / |
Statement of responsibility, etc |
Anthony Reyes [and five others] |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Rockland, MA : |
Name of publisher, distributor, etc |
Syngress Publishing, |
Date of publication, distribution, etc |
c2007 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 412 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type |
volume |
500 ## - GENERAL NOTE |
General note |
Includes index. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes appendices and index |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Contents: Chapter 1 The problem at hand -- Chapter 2 "Computer crime" discussed -- Chapter 3 Preparing for prosecution and testifying -- Chapter 4 Cyber investigative role -- Chapter 5 Incident response: live forensic and investigations -- Chapter 6 Legal issues of intercepting wifi transmissions -- Chapter 7 Seizure of digital transformation -- Chapter 8 Conducting cyber investigation -- Chapter 9 Digital forensics and analyzing data -- Chapter 10 Cyber crime prevention |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Deans/Chairperson |
|
Department |
|
Subject Category |
Criminology |
546 ## - LANGUAGE NOTE |
Language note |
English |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Investigation. |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Publisher description |
Uniform Resource Identifier |
http://www.loc.gov/catdir/enhancements/fy0713/2007296772-d.html |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Type of record |
Reference (MAIN) |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Encoded by |
girlie[new] |
Date encoded |
02/25/2015 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Encoded by |
ida[checked] |
Date encoded |
07/28/2015 |